Fall 2011. 2 Stands for Radio Frequency Identification Uses radio waves for identification New frontier in the field of information technology One form.

Slides:



Advertisements
Similar presentations
RFID Jenna Nash MJ Ko Katie Stange Kennedy Carruthers RADIO FREQUENCY IDENTIFICATION.
Advertisements

Tiny chips could be very hard to spot. Especially when “printed” onto product packaging "The vision is to move from the etched, solid metal antennas to.
RFID d. miller ● c. ichiki ● l. goetzinger ● r. hrdinsky Presented to the Class of BA 471 Winter 2006 Dr. R.F. Reitsma.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
EMBEDDED RFID IN PRODUCT IDENTIFICATION Tommi Kallonen Jari Porras Lappeenranta University of Technology.
The Consumer World of. You’ve seen it before…  Books  Digital Media  Computer Hardware  Other high value items.
J.J. Faxon Andy Vu Dustin Beck Jessica Bentz Mandi Ellis
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
RFID l. goetzinger ● m. lines ● c. mclaughlin ● c. sailer ● m. schwab Presented to the Class of BA 457.
When Two Good Things Collide: Technology and Privacy Social Context of Technology at Work Technology is “an outcome of a Socially Constructed process of.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Cow Jewelry – or – Revolution Travis Sparks
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
RFID passports How does is work? Step by step By: Einav Mimram.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
IWD2243 Wireless & Mobile Security
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Privacy and Societal Implications of RFID Katherine Albrecht Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN)
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Radio Frequency Identification So What? What is RFID Type of technology that uses electromagnetic radio frequency to identify objects, animals and humans.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
FDA Bar Code Rule Richard A. Nickel, M.S., R.Ph. Mallinckrodt Inc. St. Louis, MO.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Radio Frequency Identification (RFID) Presenter: Victoria Raskovich.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
EPCglobal Training Suite
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Interrelativity.com The Practicalities, Perils and Promise of RFID Joe McCarthy Connector in Chief Interrelativity, Inc 26 April 2005.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Applications of Rfid (radio frequency identification) © 2015 albert-learning.com APPLICATIONS OF RFID (RADIO FREQUENCY IDENTIFICATION)
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
RFID. A Technology That Changes Everything John Davis.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Ubiquitous means ‘everywhere’
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Presented by: BeeLinda L. Temple CPhT
Designing a Production Plan
What is a Radio-Frequency Identification (RFID) tag?
Radio Frequency Identification (RFID)
BEYOND THE BARCODE Beyond the Barcode.
RFID & applications گردآوری: بیتا تدین
سیستم های محافظتی و مکان یابی الکترونیکی
Team 7 Technical Presentation
Radio-Frequency Identification (RFID)
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
SOLUTION ID CARDS AND DRIVER’S LICENSES
- Dylan Leintz - Dr. Davies
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Presentation transcript:

Fall 2011

2

Stands for Radio Frequency Identification Uses radio waves for identification New frontier in the field of information technology One form of Automatic Identification Provides unique identification or serial number of an object (pallets, cases, items, animals, humans) 3

4 reader tag database application server

RFID means a world with billions of ant-sized, five-cent computers Highly mobile Contain personal information Subject to surreptitious scanning no cryptography… Access control difficult to achieve Data privacy difficult to achieve 5

Earliest Patent: John Logie Baird (1926) “Identify Friend or Foe” (IFF) systems developed by the British RAF to identify friendly aircraft. Both sides secretly tracked their enemy’s IFF. How do you identify yourself only to your friends? 6 Oh. We’re British too! Don’t shoot! We’re British!

IFF still used today for aircraft and missiles. Obviously classified. Could envision an IFF system for soldiers. Lots of military interest in pervasive networks of cheap, RFID-like sensors. Monitoring pipelines, detecting biological agents, tracking munitions, etc. 7

Mobil Speedpass systems Automobile Immobilizer systems Fast-lane and E-Zpass road toll system Secure Entry cards Animal Identification Humans Supply chain management 8

9 … and a chip attached to it … on a substrate e.g. a plastic foil... an antenna, printed, etched or stamped... A paper label with RFID inside

Euros in wallet Serial numbers: , … Wig model #4456 (cheap polyester) 30 items of lingerie Das Kapital and Communist- party handbook Replacement hip medical part # Here’s Mr. Jones in 2020…

More efficient mugging 11 “Just in case you want to know, she’s got 700 Euro and a Rolex…”

12 1. Tags can’t distinguish between authorized and unauthorized readers  Tag responds to every reader 2. Readers can’t distinguish between tags they’re allowed to identify, and those they aren’t  Readers scan every tag; privacy protection left to the tag database  #1 threatens privacy; #2 undermines confidence

1. Hidden placement of tags. Integrated into cardboard boxes Hidden in inaccessible location on product Slipped between layers of paper Sewn into clothing Embedded in plastic Printed onto product packaging Seamlessly integrated into paper 2. Unique identifiers for all objects worldwide. 3. Massive data aggregation. 4. Hidden readers. 5. Individual tracking and profiling 13

A bomb in a restaurant explodes when there are five or more Americans with RFID-enabled passports detected. A mugger marks a potential victim by querying the tags in possession of an individual. A fixed reader at any retail counter could identify the tags of a person and show the similar products on the nearby screen to a person to provide individualized marketing. A sufficiently powerful directed reader reads tags in your house or car. The ISO standard proposed for passports specifies about 4 inches (10 cm) as the typical range. However, NIST with a special purpose antenna read it at 30 feet (10 meters)! RFID enables tracking, profiling, and surveillance of individuals on a large scale 14

Tracking – Determine where individuals are and where they have been Hotlisting – Single out certain individuals because of the items they possess Profiling – Identifying the items an individual has in their possession 15

Corporate Espionage: Identify Valuable Items to Steal Monitor Changes in Inventory Personal Privacy Leaking of personal information (prescriptions, brand of underwear, etc.). Location privacy: Tracking the physical location of individuals by their RFID tags. 16

RFID casino chips, Mobil SpeedPass, EZ-Pass, FasTrak, prox cards, designer clothing. Skimming: Read your tag, make my own. Swapping: Replace real tags with decoys. Producing a basic RFID device is simple. A hobbyist could probably spoof most RFID devices in a weekend for under $50. 17

Mandel, Roach, and MIT Took a “couple weeks” and $30 to figure out how produce a proximity card emulator. Can produce fake cards for a few dollars. Can copy arbitrary data, including TechCash. Could read cards from several feet. 18

If we can’t eavesdrop or forge valid tags, can simply attack the RFID infrastructure. Wiping out inventory data. Vandalization. Interrupting supply chains. Seeding fake tags – difficult to remove. 19

The US Food and Drug Administration (FDA) recently recommended tagging prescription drugs with RFID “pedigrees”. Problems: “I’m Oxycontin. Steal me.” “Bob’s Viagra sales are really up this month.” “Hi. I’m Alice’s anti-fungal cream.” 20

21 Tags can be sewn into clothing

22 Alien/RAFSEC “I” tag in lid of Pantene shampoo bottle

23 Embedded in plastic

24 Hitachi’s mu-chip contrasted with grains of rice

25 Inkode’s “chipless tag”: Closeup of Inkode metal fibers embedded in paper

26 “Alien envisions [conductive] ink being mixed with regular packaging ink to create antennas on boxes of cereal and other disposable packaging…” "With these things you could literally tag a pack of chewing gum.” - Jacobsen, Alien Technology

27 The card in your wallet could transmit data about you

Reader devices can be invisibly embedded in: 28 Walls Doorways Floor tiles Carpeting Floor mats Vehicles Roads Sidewalks Shelving Furniture Backpacks

Broken Arrow. Wal-Mart and P&G conducted secret trials involving live consumers, then tried to cover it up Gillette “Spy Shelf.” Gillette caught taking mugshots of unsuspecting customers with shelf cameras, then shifted responsibility to partner Tesco Brockton Wal-Mart Trial. Gillette and Wal-Mart both denied existence of smart shelf until CASPIAN provided photos to the press. Auto-ID Center Confidential Documents. PR strategy involved conveying the “inevitability” of RFID, “pacifying” consumers, and relying on consumer “apathy” Benetton/Philips. Benetton misled consumers about its clothing tracking chip, telling them the chips could be “killed” at checkout 29

Wal-Mart and P&G conducted a 4-month secret RFID experiment using live consumers. Distant P&G executives used a video camera triggered by an RFID device trained on the shelf to observe shoppers. Both Wal-Mart and P&G repeatedly denied the trials until evidence was produced. 30

Gillette was caught taking mugshots of unsuspecting customers using RFID- triggered shelf cameras. Gillette initially denied the trials, then shifted responsibility to partner Tesco.

32 MfgrTypeFrequencyRead RangeComments Transponder Technologies Intellitag 500 Passive 915 MHz11 feet “Read range up to 3.5m (11.48 ft) using unlicensed 915 MHz reader with one antenna; read range up to 7m (22.96 ft) with two antennas" Telenexus Passive 915 MHz15 feet “Telenexus has developed a reader and antenna for the 915 MHz long-range RFID system...with a read range of over 15 feet. The tag is a low- cost passive transponder.” Alien Passive 915 MHz17 feet “The maximum freespace read range of these emulator tags is 5 meters, consistent with the performance of other known UHF passive tags.” iPico Passive 915 MHz 66 feet USA licensed feetUSA unlicensed 3 – 7 feet EU Read range “depends on reader configuration and tag enclosure.30 W EIRP (USA site licensed):> 20m4 W EIRP (USA unlicensed): 6- 8m500 mW ERP (Europe): 1-2m” Matrics/Savi Passiveunspecified 33 feet “The first product to come from the collaboration will be a handheld device that reads Matrics' passive EPC tags…The unit will be able to read passive tags from up to 33 feet (10 meters) away”

Team at Johns Hopkins University reverse engineer Texas Instrument’s Digital Signature Transponder Paid for gas with cloned RFID tag Started car with cloned RFID tag 33

All new US passports contain RFID chips In 2009 the system was cracked It is possible to read and copy the data from a distance of 30 feet using $250 worth of equipment 34

Tags can be used to uniquely identify objects (this is why the keen interest in RFID in commercial supply chain) with a vast name space – the Electronic Product Code (EPC) 96-bit value could uniquely identify every object you’d care to, with a lot of space left over. When tags are seen, they’ll often uniquely identify objects: “That same thing passed by this reader just now, Monday morning, and Tuesday evening.” When the wearer/bearer of a tagged object presents additional information, e.g., a driver’s license or passport, that now-revealed identity can be bound to any tags present. The next time we see a given tag, “that’s Alice’s thing... maybe we’re seeing Alice again.” This works for historical data: “We know now that that was probably Alice at all these points over the past year.” 35

Human implantable RFID tag operating at about 134 KHz because at these frequencies the RF can penetrate mud, blood, and water About the size of uncooked grain of rice Oct. 22, 2002 – US Food and Drug Administration ruled VeriChip not regulated device Oct – FDA ruled serial number in VeriChip could be linked to healthcare information Healthcare applications Implanted medical device identification Emergency access to patient-supplied health information Portable medical records access including insurance information In-hospital patient identification Medical facility connectivity via patient Disease/treatment management of at-risk populations (such as vaccination history) 36

The RFID Bill of Rights: 1) The right to know whether products contain RFID tags. 2) The right to have RFID tags removed or deactivated when they purchase products. 3) The right to use RFID-enabled services without RFID tags. 4) The right to access an RFID tag’s stored data. 5) The right to know when, where and why the tags are being read. 37